Bridle 发表于 2025-3-25 03:27:30

A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over ,(3) is a prime number, and 3 is a primitive root modulo .. . The algorithm presented here generalizes the fast algorithm to determine the linear complexity of a sequence over .(.) with period .., where . is a prime, . is a prime and a primitive root modulo ...

macrophage 发表于 2025-3-25 08:22:54

http://reply.papertrans.cn/25/2407/240613/240613_22.png

REP 发表于 2025-3-25 13:53:01

http://reply.papertrans.cn/25/2407/240613/240613_23.png

Malaise 发表于 2025-3-25 19:51:34

Shorter Verifier-Local Revocation Group Signatures from Bilinear MapsWe propose a new computational complexity assumption from bilinear map, based on which we construct Verifier-Local Revocation group signatures with shorter lengths than previous ones.

有效 发表于 2025-3-25 23:49:21

Authentication and user managementk in the standard model, from the Cramer-Shoup and Kurosawa-Desmedt constructions. The schemes obtained are quite efficient. In fact, the Cramer-Shoup derived schemes are more efficient than the previous schemes from this construction, including the Cramer-Shoup cryptosystem, when long messages are

Flatus 发表于 2025-3-26 03:38:30

Authentication and user managementconcept was introduced by Shamir. Their scheme achieves chosen-ciphertext security (. secure in the sense of .); however, the security reduction is far from being tight..In this paper, we present an efficient variant of the Boneh-Franklin scheme that achieves a tight security reduction. Our scheme i

礼节 发表于 2025-3-26 07:01:26

http://reply.papertrans.cn/25/2407/240613/240613_27.png

哥哥喷涌而出 发表于 2025-3-26 10:09:35

http://reply.papertrans.cn/25/2407/240613/240613_28.png

教育学 发表于 2025-3-26 14:05:41

http://reply.papertrans.cn/25/2407/240613/240613_29.png

抚育 发表于 2025-3-26 18:04:36

The Zope 3 Component Architecturestandards for short range wireless communication. All such key exchange protocols employ data authentication as an unavoidable subtask. As a solution, we propose an asymptotically optimal protocol family for data authentication that uses short manually authenticated out-of-band messages. Compared to
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Cryptology and Network Security; 5th International Co David Pointcheval,Yi Mu,Kefei Chen Conference proceedings 2006 Springer-Verlag Berlin